Docker environment for Secure D Knowledge Sharing day #2 in topic 'Exploit development 0x41 - buffer overflow'.
This Docker is contained 2 Exploitable binary and Exploitation tools.
- greet - Buffer Overflow Technique.
- greet2 - Ret2libc Technique.
- radare2 - Reversing & debugging.
- gdb & gef - Reversing & debugging .
- pwntools - Craft an exploit.
- VIM - Best editor in the world.
-
Disable ASLR
./disable_aslr.sh
-
Build & run Docker
./build.sh && ./run.sh
-
ssh to docker user:user
ssh user@localhost -p 2222
-
Pwn an exploitable binary and get a flag!